Data security system and method associated with data mining
First Claim
1. A method of securing data and managing the separation of user-based communities of interest based upon a plurality of security levels in a computer system with memories designated as a remainder store and a plurality of extract stores, said data having one or more security sensitive words, data objects, characters or icons, comprising:
- extracting said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data;
storing said extracted data and said remainder data in said extract stores and said remainder store, respectively; and
, permitting reconstruction of some or all of said data via one or more of said subsets of extracted data and remainder data only in the presence of a predetermined security level of said plurality of security levels.
2 Assignments
0 Petitions
Accused Products
Abstract
The data security method, system and associated data mining enables multiple users, each having a respective security clearance level to access security sensitive words, data objects, characters or icons. The method extracts security sensitive words, data objects, characters or icons from plaintext or other source documents to obtain (a) subsets of extracted data and (b) remainder data. The extracted data is, in one embodiment, stored in a multilevel security system (MLS) which separates extract data of different security levels with MLS guards. Some or all of the original data is reconstructed via one or more of the subsets of extracted data and remainder data only in the presence of a predetermined security level. In this manner, an inquiring party, with the proper security clearance, can data mine the data in the MLS secured storage.
149 Citations
78 Claims
-
1. A method of securing data and managing the separation of user-based communities of interest based upon a plurality of security levels in a computer system with memories designated as a remainder store and a plurality of extract stores, said data having one or more security sensitive words, data objects, characters or icons, comprising:
-
extracting said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data;
storing said extracted data and said remainder data in said extract stores and said remainder store, respectively; and
,permitting reconstruction of some or all of said data via one or more of said subsets of extracted data and remainder data only in the presence of a predetermined security level of said plurality of security levels. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of securing data and managing the separation of user-based communities of interest based upon a plurality of security levels in a computer system with memories designated as a remainder store and a plurality of extract stores, said data having one or more security sensitive words, data objects, characters or icons grouped in (a) subsets of extracted data and (b) remainder data, comprising:
-
storing said extracted data and said remainder data in said extract stores and said remainder store, respectively; and
,permitting reconstruction of some or all of said data via one or more of said subsets of extracted data and remainder data only in the presence of a predetermined security level of said plurality of security levels. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer readable medium containing programming instructions for securing data and managing the separation of user-based communities of interest based upon a plurality of security levels in a computer system with memories designated as a remainder store and a plurality of extract stores, said data having one or more security sensitive words, data objects, characters or icons, the programming instructions comprising:
-
extracting said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data;
storing said extracted data and said remainder data in said extract stores and said remainder store, respectively; and
,permitting reconstruction of some or all of said data via one or more of said subsets of extracted data and remainder data only in the presence of a predetermined security level of said plurality of security levels. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A computer readable medium containing programming instructions for securing data and managing the separation of user-based communities of interest based upon a plurality of security levels in a computer system with memories designated as a remainder store and a plurality of extract stores, said data having one or more security sensitive words, data objects, characters or icons grouped in (a) subsets of extracted data and (b) remainder data, the programming instructions comprising:
-
storing said extracted data and said remainder data in said extract stores and said remainder store, respectively; and
,permitting reconstruction of some or all of said data via one or more of said subsets of extracted data and remainder data only in the presence of a predetermined security level of said plurality of security levels. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. An information processing system for securing data and managing the separation of user-based communities of interest based upon a plurality of security levels in a computer system with memories designated as a remainder store and a plurality of extract stores, said data having one or more security sensitive words, data objects, characters or icons, comprising:
-
means for extracting said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data;
means for storing said extracted data and said remainder data in said extract stores and said remainder store, respectively; and
,means for permitting reconstruction of some or all of said data via one or more of said subsets of extracted data and remainder data only in the presence of a predetermined security level of said plurality of security levels. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. An information processing system for securing data and managing the separation of user-based communities of interest based upon a plurality of security levels in a computer system with memories designated as a remainder store and a plurality of extract stores, said data having one or more security sensitive words, data objects, characters or icons grouped in (a) subsets of extracted data and (b) remainder data, comprising:
-
means for storing said extracted data and said remainder data in said extract stores and said remainder store, respectively; and
,means for permitting reconstruction of some or all of said data via one or more of said subsets of extracted data and remainder data only in the presence of a predetermined security level of said plurality of security levels. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78)
-
Specification